Skip to main content
guest
Join
|
Help
|
Sign In
lssdlwict
Home
guest
|
Join
|
Help
|
Sign In
lssdlwict
Wiki Home
Recent Changes
Pages and Files
Members
Home
LSSD LwICT Study Group Members
Literacy with ICT Across the Curriculum - Manitoba Education**
does it fi
Edit
0
2
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
AFFECTIVE DOMAIN | Student Friendly
Knows
Comprehends
Becomes Aware
Analyzes
Applies
Believes
Synthesizes
Evaluates
Values
Ethics and Responsibility
E-1.1
I show respect as I work with others and with ICT.
E-2.1
I follow my school division rules for using ICT.
E-3.1
I think about the effects that my use of ICT has on others and I choose to use ICT ethically and responsibly.
E-1.2
I understand the rules and how they help keep me safe when I use ICT.
(examples: guidelines for Internet safety, security of user names and passwords, responsible use of email...)
E-2.2
I follow guidelines that help keep me safe while communicating electronically.
(examples: email, Internet, threaded discussions, videoconferences, chats, instant messages, camera phones, blogs, podcasts, online whiteboards…)
E-3.2
I evaluate whether my use of ICT will help or get in the way of my learning in a particular situation.
E-1.3
I know I must give credit to authors when I use their work.
(examples: plagiarism, copyright violations, willful destruction/manipulation of data, hacking, propagating viruses, spamming, software piracy, consumer fraud, cyberbullying, identity theft...)
E-2.3
I tell how breaking the rules of using ICT can hurt me and others.
(examples: respects other's privacy, protects personal information, follows security procedures, acknowledges intellectual property, credits sources, uses licensed software, discourages cyberbullying, collects data ethically, analyzes information ethically…)
E-1.4
I tell about ways that using ICT can be unhealthy.
(examples: ergonomics, inactivity, carpal tunnel syndrome, repetitive stress injury, eye strain, Internet addiction...)
E-2.4
I am a good digital citizen and use ICT responsibly.
Social Implications
S-1.1
I give examples of how ICT is used in my home, in school, and where people work.
(examples: recreation, communication, education, sales, health care...)
S-2.1
I predict how ICT might be used in the future.
S-3.1
I make up my mind about whether information needs to remain private or be made public.
S-1.2
I explain how dishonest use of ICT can harm people and society.
S-2.2
I predict some ICT skills I might need in my future career.
S-3.2
I determine some benefits and risks of ICT for society.
(example: outsourcing jobs…)
S-1.3
I use ICT only at appropriate times and in appropriate places.
S-2.3
I analyze some of the advantages and disadvantages of how ICT is used in the world.
(examples: lack of access, consequences of unethical use, ease of manipulation of data, ease of communication of information, Internet addiction...)
Collaboration
Co-1.1
I work with others to gather information or to create electronic work.
(examples: active listening with a partner, collaborative creation of ICT products, participation in team webquests...)
Co-2.1
I team up with others to plan and work together.
(examples: assumes assigned group roles, sets group goals, solves group productivity issues...)
Co-3.1
I lead my group in a collaborative task.
(examples: motivates team members, values individuals' contributions, manages group conflict, works toward consensus...)
Co-2.2
I work with others online to complete assignments.
(examples: email, Internet, threaded discussions, videoconferences, chats, instant messages, camera phones, blogs, podcasts, online whiteboards...)
Co-3.2
I determine the benefits and challenges of using ICT to complete a particular collaborative task.
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Comprehends
Becomes Aware
Applies
Believes
Evaluates
Values
(examples: guidelines for Internet safety, security of user names and passwords, responsible use of email...)
(examples: email, Internet, threaded discussions, videoconferences, chats, instant messages, camera phones, blogs, podcasts, online whiteboards…)
(examples: plagiarism, copyright violations, willful destruction/manipulation of data, hacking, propagating viruses, spamming, software piracy, consumer fraud, cyberbullying, identity theft...)
(examples: respects other's privacy, protects personal information, follows security procedures, acknowledges intellectual property, credits sources, uses licensed software, discourages cyberbullying, collects data ethically, analyzes information ethically…)
(examples: ergonomics, inactivity, carpal tunnel syndrome, repetitive stress injury, eye strain, Internet addiction...)
(examples: recreation, communication, education, sales, health care...)
(example: outsourcing jobs…)
(examples: lack of access, consequences of unethical use, ease of manipulation of data, ease of communication of information, Internet addiction...)
(examples: active listening with a partner, collaborative creation of ICT products, participation in team webquests...)
(examples: assumes assigned group roles, sets group goals, solves group productivity issues...)
(examples: motivates team members, values individuals' contributions, manages group conflict, works toward consensus...)
(examples: email, Internet, threaded discussions, videoconferences, chats, instant messages, camera phones, blogs, podcasts, online whiteboards...)